default search action
Cryptologia, Volume 33
Volume 33, Number 1, 2009
- Louis Kruh:
A Belated Tribute to Rosario Candela. 1-11 - Jean-Philippe Aumasson:
Cryptanalysis of a Hash Function Based on Norm Form Equations. 12-15 - Cheryl L. Beaver:
Cryptology in the Classroom: Analyzing a Zero-Knowledge Protocol. 16-23 - Tomi S. Melka:
Some Considerations about the Kohau Rongorongo Script in the Light of a Statistical Analysis of the 'Santiago Staff'. 24-73 - Jan Bury:
Breaking Unbreakable Ciphers. The Asen Georgiyev Spy Case. 74-88
- Chris Christensen:
Review of Modern Cryptanalysis: Techniques for Advanced Code Breaking by Christopher Swenson. 89-94 - David Hamer:
Review of Herivelismus and the German Military Enigma by John Herivel. 95-97 - Colin B. Burke:
Review of Echoes of our Past by the Naval Cryptologic Veterans Association. 98 - James David:
Review of The U.S. Intelligence Community (Fifth Edition) by Jeffrey T. Richelson. 99-101 - Raphael C.-W. Phan:
Review of Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd Edition by Ross J. Anderson. 102-103 - David Kruh:
Review of Spies of the Bible: Espionage in Israel from the Exodus to the Bar Kokhba Revolt by Rose Mary Sheldon. 104-105
Volume 33, Number 2, 2009
- Craig P. Bauer:
Dedication to Dr. Jay Anderson. 107
- John F. Dooley, Yvonne I. Ramirez:
Who Wrote The Blonde Countess? A Stylometric Analysis of Herbert O. Yardley's Fiction. 108-117 - José Ramón Soler Fuensanta:
Treaty of Cryptography by Joaquín García Carmona? 118-124 - Blake Rice, Bill Yankosky:
Elliptic Curve Cryptography with the TI-83. 125-141 - Tim McDevitt, Tom Leap:
Multimedia Cryptology. 142-150 - Mike May:
Using Maple Worksheets to Enable Student Explorations of Cryptography. 151-157 - David E. Boliver:
Cryptology as College Outreach to Young Teens. 158-165 - David Link:
Resurrecting Bomba Kryptologiczna: Archaeology of Algorithmic Artefacts, I. 166-182 - Jiqiang Liu, Sheng Zhong:
Analysis of Kim-Jeon-Yoo Password Authentication Schemes. 183-187 - José de Jesús Angel Angel, Guillermo Morales-Luna:
Cryptographic Methods During the Mexican Revolution. 188-196
- Colin B. Burke:
Review of American Cryptology during the Cold War, 1945-1989 by Thomas R. Johnson. 197-200 - Chris Christensen:
Review of An Introduction to Mathematical Cryptography by Hoffstein, Pipher, and Silverman. 201-204 - Howard E. Brandt:
Review of Protecting Information: From Classical Error Correction to Quantum Cryptography by Susan Loepp and William K. Wootters. 205-207 - David Joyner:
Review of Algorithmic Number Theory: Lattices, Curves and Cryptography, Edited by J. P. Buhler and P. Stevenhagen. 208-211 - John F. Dooley:
Reviews of Cryptologic Fiction. 212-215
Volume 33, Number 3, 2009
- Eimear Gallery, Chris J. Mitchell:
Trusted Computing: Security and Applications. 217-245 - Jongsung Kim, Raphael C.-W. Phan:
Advanced Differential-Style Cryptanalysis of the NSA's Skipjack Block Cipher. 246-270
- Chris Christensen:
Reviews of Two Post-Quantum Cryptography Books. 271-273 - David Hamer:
Review of From Bletchley with Love by Mavis Batey. 274-275
- John F. Dooley:
Another Yardley Mystery. 276-282 - David Chaum, Benjamin Hosp, Stefan Popoveniuc, Poorvi L. Vora:
Accessible Voter-Verifiability. 283-291
- Stephen Budiansky:
Review of Decoding the IRA by Tom Mahon and James J. Gillogly. 292-294
Volume 33, Number 4, 2009
- Kathryn A. Schwartz:
Charting Arabic Cryptology's Evolution. 297-304 - Sean Simmons:
Algebraic Cryptanalysis of Simplified AES. 305-314 - Haihua Gu, Dawu Gu:
Speeding Up the Double-Base Recoding Algorithm of Scalar Multiplication. 315-320 - Sujith Ravi, Kevin Knight:
Attacking Letter Substitution Ciphers with Integer Programming. 321-334 - Dae Hyun Yum, Pil Joong Lee:
Cracking Hill Ciphers with Goodness-of-Fit Statistics. 335-342 - Klaus Schmeh:
Enigma's Contemporary Witness: Gisbert Hasenjaeger. 343-346 - Jan Bury:
From the Archives: CX-52 Messages Read by Red Poles? 347-352
- Henry B. Wolfe:
Review of Eavesdropping on Hell: Historical Guide to Western Communications Intelligence and Holocaust, 1939-1945 by Robert J. Hanyok. 353-355 - Chris Christensen:
Review of The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America by James Bamford. 356-358 - Chris Christensen:
Review of Random Curves by Neal Koblitz. 359-365 - Chris Christensen:
Review of Ultra Versus U-Boats: Enigma Decrypts in The National Archives by Roy Conyers Nesbit. 366-369
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.